SlideShare a Scribd company logo
1 of 36
CLASS 1
Multimedia English
Course Outline
In this course you will study:
 Pop Culture - it’s a big world out there, and you should enjoy it.
 Messaging from different types of media.
 How to use the internet to find useful information
 How to use online software to create different types of media
 How to appropriately use social networks and protect your privacy
After taking this course, you should be able to:
 Analyze different types of messaging from mass media
 Find information quickly and effectively
 Use online software to collect information and create content
 Use different kinds of social networks appropriately
Some of what we’ll cover:
Information literacy
Advertising techniques
Memes
Social Media
Music Genres
Charts, Polls and Graphs
Slang and Popular Culture
Whatever you come up with!
Grading
Your grades will be determined as follows:
Quizzes – 20%
Exams – 20%
Presentations – 20%
Assignments – 25%
Attendance and participation – 15%
For attendance - do NOT miss more than 3 classes.
Come on time.
Turn off your cell phones. I’M SERIOUS!
Have fun - Pop culture is mean to be enjoyed!
Our class website
media.jadekite.com
You’ll need to register for the website.
Go to the website.
Register.
Don’t forget to open your email for the link
Log in.
Post your student number and English name on the
post.
Let’s get started!
Chat acronyms
What do these mean?
LOL
CUL8R
AFAIK
b4
AFK
BCNU
BRB
BTW
Let’s get started!
Chat acronyms
What do these mean?
LOL - Laugh Out Loud
CUL8R - See You Later
AFAIK - As Far As I Know
b4 - Before
AFK - Away From the Keyboard
BCNU - Be seeing you
BRB - Be Right Back
BTW - By The Way
Pop Culture? Pop Music!
www.youtube.com/watch?v=09R8_2nJtjg
The video shows Maroon 5 crashing (coming without an invitation)
weddings in Los Angeles.
Pop Culture? Pop Music!
www.youtube.com/watch?v=kt0g4dWxEBo
"FourFiveSeconds" received critical acclaim from music critics,
who praised Rihanna's and West's new direction, their vocals,
and the song's simple style.
Internationally, the song reached number one in Australia and the
top five in Canada, France, New Zealand and the United
Kingdom.
Pop Culture? Pop Music!
www.youtube.com/watch?v=MYSVMgRr6pw
Hozier (Andrew Hozier-Byrne) wrote and recorded the song in the attic of his
parent's home in Bray, County Wicklow, Ireland. Its lyrics detail Hozier's
frustration with the Catholic Church and its stance on homosexuality.
Pop Culture? Pop Music!
www.youtube.com/watch?v=lp-EO5I60KA
He made a guest appearance on Taylor Swift's fourth studio album, Red, and
wrote songs for One Direction.
He spent much of 2013 touring North America as the opening act for Swift's
The Red Tour.
Pop Culture? Pop Music!
www.youtube.com/watch?v=OPf0YbXqDm0
Mark Daniel Ronson is an English musician, DJ, singer, and record
producer.
Bruno Mars’ real name is Peter Gene Hernandez.
info: Wikipedia and http://www.billboard.com/charts/hot-100
THREATS AND ISSUES WHEN YOU USE THE INTERNET
Being careful online
Internet
Security
The internet is such a
big part of your lives
that we can forget that
it even though it is
convenient, it can also
be dangerous.
You need to be careful.
Today I will introduce
some of the most
common threats ( 威
脅 ).
Sources:
http://www.slideshare.net/TechSo
upGlobal/security-basics-webinar
http://en.wikipedia.org/
Malware
Phishing
Social Network Hacking
Malware
Most of you have heard of a
computer “virus” before…
Viruses are actually a kind
of Malware ( 惡意軟體 )
Virus - a program that can spread
from computer to computer by
itself.
Trojan - a hidden program (for
example in free / illegal software)
Bot - a robot network
which can be controlled
outside the computer.
Keystroke logger
(keylogger): a program
that records what you
type into the computer.
Virus
Some viruses can be
harmless, but others
can slow down or even
ruin a computer. Many
people don’t even know
that their computer has
a virus at all.
A computer virus is a computer
program that can spread from one
computer to another.
A virus can spread from one
computer to another using code,
for instance because a user sent it
over the Internet, or carried it on
a memory device such as
a CD, DVD, or USB drive.
Viruses that spread them-
selves online or across a
network are called worms.
Trojans
The term “Trojan” comes
from the Greek story about
the Trojan Horse from a
very old story (The Iliad).
In the story, Greeks left a
big wooden horse to the
Trojans, people they were at
war against. After the
Trojans brought the horse
into the city, the Greeks who
were hidden inside snuck
out and opened the city
gates to let the Greek army
come in and destroy the city
of Troy.
A Trojan horse, or Trojan, is
software that hides inside
software and then steals
information or hurts the user’s
computer.
Some things trojans can do to
your computer:
 Make your computer a “zombie”
 Download or upload files
 Steal your information
 Watch your screen
 Crash your computer
 Record your keystrokes
Bots, botnets
and zombies!
Bots, or internet robots,
didn’t start out as bad - and
not all of them are. For
example, Google uses bots
to get for their search
results.
What we are talking about
here are botnets, which take
over computers and become
an army of computers doing
what they are told, or
zombies, by an outside
program.
One kind of malware, usually
brought into a computer through
a trojan, is a bot. Here’s one of the
way hackers can use bots:
Bots, botnets
and zombies!
Bots, or internet robots,
didn’t start out as bad - and
not all of them are. For
example, Google uses bots
to get for their search
results.
What we are talking about
here are botnets, which take
over computers and become
an army of computers doing
what they are told, or
zombies, by an outside
program.
Botnets are bad. Really bad. They can
be used to send spam, send or
download files or even more malware,
and they can even be used for
Distributed Denial of Service (DDoS)
attacks, where so many different
computers are told to go to the same
website all
at the same
time that
the website
crashes.
Keyloggers
Keyloggers are actually
quite easy to write. Usually
keyloggers are put together
with other types of
malware.
Keyloggers simply record whatever the
user is typing on their keyboard.
Some keyloggers also record what is
on the screen at the same time. Here’s
an example of a keylogger file that
also shows what form the user was
typing in (form grabbing):
Keyloggers
Keyloggers are some of the worst
kinds of malware. Spies love
keyloggers, and countries often
try to sneak them onto
computers. Sometimes people use
them to spy on each other - for
example, maybe a husband thinks
his wife has a secret boyfriend…
Criminals use keyloggers to try to
get usernames and
passwords for bank
information.
Phishing
While phishing isn’t a
from of malware (it’s
more like tricking you
and stealing), it’s
becoming more and
more common, and
more dangerous.
Phishing is a way of tricking people
into giving their information to what
they think is a site they can trust.
Here’s an example:
The link in the email takes you to a
login page that asks you to type in
your gmail information.
Look at the domain name!
More Phishing
Phishing has become a
real problem in recent
years, and social media
sites are one of their
favorite targets.
Here’s another example of an
email that takes you to a phishing
site:
Here’s another phishing example:
And a “friend phishing” example:
Who is Sophie Ng?
Let’s see if Google knows her:
Take one of her profile pictures and put it into Google images.
Hey, that’s a different
name! What’s going on?
After Google searching…
After uploading a couple of
“Sophie” pictures to Google and
getting several different Facebook
profiles, her pictures appeared on
a different site, where she was listed as “Cute college girl of
the day for October 22, 2010”
It turns out that people use her (and other college girl photos)
to try to get people to accept her as a Facebook friend. Once
she has been accepted, the hackers can get information on
you and your friends, or get other people to click on links that
will download malware to their computers.
Why?
Why are people doing
this? What’s the point?
Underground cybercrime economy
Bigger business than international
drug trade
Hackers with computer skills and
desire for money
Organized online buy/sell of stolen
data
Low risk, high reward - many
hackers can attack anywhere in the
world from their own countries, and
most countries don’t have strong
laws against hacking
OK Now:
Log into Facebook and
check through your
friends. Do you really
know them?
 Go to Facebook. If there are people in your friends
list that you don’t really know, put the link to their
picture into Google images and see if they are
really who they say they are.
 Check your email. Are there any emails asking you
to update your information? If so, check the
domain name. Is it really the website it says it is?
 Update your anti-virus software and do a full
system scan of your computer at least once a
week. Change your passwords every 3-4 months
 Think! Be skeptical ( 懷疑論的 ) about what
people are sending you, and be careful!
So what can
you do?
How can you protect
yourself from these
kinds of online threats?
Don’t expect something for
nothing.
Don’t download pirated software, or
“keygens” - software that will give you
a license number for software.
Don’t friend people on Facebook that
you don’t know - even if you think
they’re attractive!
Carefully check where your email is
coming from - always check the
domain name of the sender.
THE MEMORABLE CHARACTER
Advertising Technique A
The Interesting Character
Some of the world's most memorable advertisements
use this technique.
The character needs to be interesting. Different.
Unexpected. With lots of personality, or quirky
(unusual) behavior.
These characters will grab attention
because they are strong and different
from other ads,
making people
remember them.
source; http://www.adcracker.com/
Some examples
PX mart
The Most Interesting Man in the World
Panda Cheese
Old Spice
Meme of the Week
• Ideas can spread very quickly.
Things can become very
popular in a very short time.
• For example, viral videos – in a very short time,
millions of people will have hear of and seen a certain
video online.
• This sudden popularity online is called a meme.
• What's a meme?
Memes and their cycles
• Memes almost always have phases, or time periods.
• Introduction. The meme is introduced, and becomes
popular.
• Overexposure – the meme becomes too popular, and
people start to get tired of it.
• Parody – people will make fun of the meme, usually
by changing or “remixing” it.
• Equilibrium – finally, the meme calms down, and is
only occasionally used, or it goes away.
Review
What’s the class website?
What are you going to learn in this class?
How many classes can you miss?
What are the following:
Why do you have to be careful on Facebook?
LOL CUL8R AFAIK b4 AFK BCNU BRB BTW
What meme did we learn about this week?
Who has the most popular popular pop song
in America this week? What is it?

More Related Content

What's hot

Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe OnlineMatt Smith
 
Keep your teens safe on the internet
Keep your teens safe on the internetKeep your teens safe on the internet
Keep your teens safe on the internetDeborah Brown
 
Social Networking and Cloud Computing
Social Networking and Cloud ComputingSocial Networking and Cloud Computing
Social Networking and Cloud ComputingDeirdreJ6972
 
Contextual identity w2sp
Contextual identity  w2spContextual identity  w2sp
Contextual identity w2spmonicachew
 
Facebook Friend Or Foe
Facebook Friend Or FoeFacebook Friend Or Foe
Facebook Friend Or Foeshamburg
 
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeYouth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeNathan Wright
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingShotzy Paugh
 
Digital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient TweetsDigital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient Tweetsmartin255
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowVA Simple Services
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The UglyDr. Joel Evans
 
Lingo bingo cheatsheet-1
Lingo bingo cheatsheet-1Lingo bingo cheatsheet-1
Lingo bingo cheatsheet-1NAFCareerAcads
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 

What's hot (20)

Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe Online
 
Keep your teens safe on the internet
Keep your teens safe on the internetKeep your teens safe on the internet
Keep your teens safe on the internet
 
Social Networking and Cloud Computing
Social Networking and Cloud ComputingSocial Networking and Cloud Computing
Social Networking and Cloud Computing
 
Contextual identity w2sp
Contextual identity  w2spContextual identity  w2sp
Contextual identity w2sp
 
Facebook Friend Or Foe
Facebook Friend Or FoeFacebook Friend Or Foe
Facebook Friend Or Foe
 
Troll Wars
Troll WarsTroll Wars
Troll Wars
 
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeYouth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media Age
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social Networking
 
Digital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient TweetsDigital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient Tweets
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should Know
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Lingo bingo cheatsheet-1
Lingo bingo cheatsheet-1Lingo bingo cheatsheet-1
Lingo bingo cheatsheet-1
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Digital Tattoo Website Orientation
Digital Tattoo Website OrientationDigital Tattoo Website Orientation
Digital Tattoo Website Orientation
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 

Viewers also liked

CSR and Value Creation: shareholders, communities and governments
CSR and Value Creation: shareholders, communities and governmentsCSR and Value Creation: shareholders, communities and governments
CSR and Value Creation: shareholders, communities and governmentsWayne Dunn
 
Tarea de heramientas de colaboracion digital
Tarea de heramientas de colaboracion digitalTarea de heramientas de colaboracion digital
Tarea de heramientas de colaboracion digitalFabian Garcia
 
Las brujas de salem. version
Las brujas de salem. versionLas brujas de salem. version
Las brujas de salem. versionLily Bravo
 
Overview - Political economy of agricultural policy processes in Africa
Overview - Political economy of agricultural policy processes in AfricaOverview - Political economy of agricultural policy processes in Africa
Overview - Political economy of agricultural policy processes in Africafutureagricultures
 
Denúncia da Lava Jato contra João Santana
Denúncia da Lava Jato contra João SantanaDenúncia da Lava Jato contra João Santana
Denúncia da Lava Jato contra João SantanaMiguel Rosario
 
Questão de ordem - suspeição do relator da Comissão de Impeachment
Questão de ordem - suspeição do relator da Comissão de ImpeachmentQuestão de ordem - suspeição do relator da Comissão de Impeachment
Questão de ordem - suspeição do relator da Comissão de ImpeachmentMiguel Rosario
 
An Ounce of Prevention
An Ounce of PreventionAn Ounce of Prevention
An Ounce of Preventionmarinabooh
 
Kell e új megközelítés a marketing tervezésben ?
Kell e új megközelítés a marketing tervezésben ?Kell e új megközelítés a marketing tervezésben ?
Kell e új megközelítés a marketing tervezésben ?Edit Ditte Szabó
 
Begosais pardevejs ok 14.04.2011
Begosais pardevejs ok 14.04.2011Begosais pardevejs ok 14.04.2011
Begosais pardevejs ok 14.04.2011Normunds Reips
 
Sesion extraordinaria discusion pdd municipal
Sesion extraordinaria discusion pdd municipalSesion extraordinaria discusion pdd municipal
Sesion extraordinaria discusion pdd municipalAlexander Puertas
 
This time it is in my backyard! A major LNG project and I'm a Stakeholder ins...
This time it is in my backyard! A major LNG project and I'm a Stakeholder ins...This time it is in my backyard! A major LNG project and I'm a Stakeholder ins...
This time it is in my backyard! A major LNG project and I'm a Stakeholder ins...Wayne Dunn
 

Viewers also liked (20)

CSR and Value Creation: shareholders, communities and governments
CSR and Value Creation: shareholders, communities and governmentsCSR and Value Creation: shareholders, communities and governments
CSR and Value Creation: shareholders, communities and governments
 
Final
FinalFinal
Final
 
Tarea de heramientas de colaboracion digital
Tarea de heramientas de colaboracion digitalTarea de heramientas de colaboracion digital
Tarea de heramientas de colaboracion digital
 
Ideas generation
Ideas generationIdeas generation
Ideas generation
 
Lagu-lagu SM
Lagu-lagu SMLagu-lagu SM
Lagu-lagu SM
 
Pitch
PitchPitch
Pitch
 
Las brujas de salem. version
Las brujas de salem. versionLas brujas de salem. version
Las brujas de salem. version
 
Overview - Political economy of agricultural policy processes in Africa
Overview - Political economy of agricultural policy processes in AfricaOverview - Political economy of agricultural policy processes in Africa
Overview - Political economy of agricultural policy processes in Africa
 
affTA11 - LampiranC
affTA11 - LampiranCaffTA11 - LampiranC
affTA11 - LampiranC
 
Denúncia da Lava Jato contra João Santana
Denúncia da Lava Jato contra João SantanaDenúncia da Lava Jato contra João Santana
Denúncia da Lava Jato contra João Santana
 
Questão de ordem - suspeição do relator da Comissão de Impeachment
Questão de ordem - suspeição do relator da Comissão de ImpeachmentQuestão de ordem - suspeição do relator da Comissão de Impeachment
Questão de ordem - suspeição do relator da Comissão de Impeachment
 
An Ounce of Prevention
An Ounce of PreventionAn Ounce of Prevention
An Ounce of Prevention
 
Columns
ColumnsColumns
Columns
 
Kell e új megközelítés a marketing tervezésben ?
Kell e új megközelítés a marketing tervezésben ?Kell e új megközelítés a marketing tervezésben ?
Kell e új megközelítés a marketing tervezésben ?
 
Begosais pardevejs ok 14.04.2011
Begosais pardevejs ok 14.04.2011Begosais pardevejs ok 14.04.2011
Begosais pardevejs ok 14.04.2011
 
Sesion extraordinaria discusion pdd municipal
Sesion extraordinaria discusion pdd municipalSesion extraordinaria discusion pdd municipal
Sesion extraordinaria discusion pdd municipal
 
This time it is in my backyard! A major LNG project and I'm a Stakeholder ins...
This time it is in my backyard! A major LNG project and I'm a Stakeholder ins...This time it is in my backyard! A major LNG project and I'm a Stakeholder ins...
This time it is in my backyard! A major LNG project and I'm a Stakeholder ins...
 
01 01-2015
01 01-201501 01-2015
01 01-2015
 
Como ler a bíblia
Como ler a bíbliaComo ler a bíblia
Como ler a bíblia
 
Agenda robert guzman
Agenda robert guzmanAgenda robert guzman
Agenda robert guzman
 

Similar to Multimedia01

Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Essay Winter Season In Hindi
Essay Winter Season In HindiEssay Winter Season In Hindi
Essay Winter Season In HindiCrystal Wright
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)MrYoung
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safetyErnest Staats
 

Similar to Multimedia01 (20)

C 7
C 7C 7
C 7
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
C 7
C 7C 7
C 7
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Essay Winter Season In Hindi
Essay Winter Season In HindiEssay Winter Season In Hindi
Essay Winter Season In Hindi
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Social Media - It Can Be Good, Bad, and Ugly
Social Media  - It Can Be Good, Bad, and UglySocial Media  - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
 
Facebook
FacebookFacebook
Facebook
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
 

More from Les Davy

1051 Tourism English Unit 3
1051 Tourism English Unit 31051 Tourism English Unit 3
1051 Tourism English Unit 3Les Davy
 
1051 Tourism English Unit 4
1051 Tourism English Unit 41051 Tourism English Unit 4
1051 Tourism English Unit 4Les Davy
 
1051 Tourism English class 4 week 5
1051 Tourism English class 4 week 51051 Tourism English class 4 week 5
1051 Tourism English class 4 week 5Les Davy
 
1051 Tourism English Week 4
1051 Tourism English Week 41051 Tourism English Week 4
1051 Tourism English Week 4Les Davy
 
Vocab colors
Vocab   colorsVocab   colors
Vocab colorsLes Davy
 
Tourism English 15
Tourism English 15Tourism English 15
Tourism English 15Les Davy
 
Shopping items
Shopping itemsShopping items
Shopping itemsLes Davy
 
Tourism English 14
Tourism English 14Tourism English 14
Tourism English 14Les Davy
 
Advertising Techniques 3
Advertising Techniques 3Advertising Techniques 3
Advertising Techniques 3Les Davy
 
Tourism English 13
Tourism English 13Tourism English 13
Tourism English 13Les Davy
 
Our scavenger hunt
Our scavenger huntOur scavenger hunt
Our scavenger huntLes Davy
 
Guess the foods
Guess the foodsGuess the foods
Guess the foodsLes Davy
 
Tourism English 9
Tourism English 9Tourism English 9
Tourism English 9Les Davy
 
Tourism English 10
Tourism English 10Tourism English 10
Tourism English 10Les Davy
 
Tourism english 9
Tourism english 9Tourism english 9
Tourism english 9Les Davy
 
Tourism english 8
Tourism english 8Tourism english 8
Tourism english 8Les Davy
 
Tourism English 7
Tourism English 7Tourism English 7
Tourism English 7Les Davy
 
Multimedia06
Multimedia06Multimedia06
Multimedia06Les Davy
 
Tourism english 5
Tourism english 5Tourism english 5
Tourism english 5Les Davy
 
Multimedia05
Multimedia05Multimedia05
Multimedia05Les Davy
 

More from Les Davy (20)

1051 Tourism English Unit 3
1051 Tourism English Unit 31051 Tourism English Unit 3
1051 Tourism English Unit 3
 
1051 Tourism English Unit 4
1051 Tourism English Unit 41051 Tourism English Unit 4
1051 Tourism English Unit 4
 
1051 Tourism English class 4 week 5
1051 Tourism English class 4 week 51051 Tourism English class 4 week 5
1051 Tourism English class 4 week 5
 
1051 Tourism English Week 4
1051 Tourism English Week 41051 Tourism English Week 4
1051 Tourism English Week 4
 
Vocab colors
Vocab   colorsVocab   colors
Vocab colors
 
Tourism English 15
Tourism English 15Tourism English 15
Tourism English 15
 
Shopping items
Shopping itemsShopping items
Shopping items
 
Tourism English 14
Tourism English 14Tourism English 14
Tourism English 14
 
Advertising Techniques 3
Advertising Techniques 3Advertising Techniques 3
Advertising Techniques 3
 
Tourism English 13
Tourism English 13Tourism English 13
Tourism English 13
 
Our scavenger hunt
Our scavenger huntOur scavenger hunt
Our scavenger hunt
 
Guess the foods
Guess the foodsGuess the foods
Guess the foods
 
Tourism English 9
Tourism English 9Tourism English 9
Tourism English 9
 
Tourism English 10
Tourism English 10Tourism English 10
Tourism English 10
 
Tourism english 9
Tourism english 9Tourism english 9
Tourism english 9
 
Tourism english 8
Tourism english 8Tourism english 8
Tourism english 8
 
Tourism English 7
Tourism English 7Tourism English 7
Tourism English 7
 
Multimedia06
Multimedia06Multimedia06
Multimedia06
 
Tourism english 5
Tourism english 5Tourism english 5
Tourism english 5
 
Multimedia05
Multimedia05Multimedia05
Multimedia05
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Multimedia01

  • 2. Course Outline In this course you will study:  Pop Culture - it’s a big world out there, and you should enjoy it.  Messaging from different types of media.  How to use the internet to find useful information  How to use online software to create different types of media  How to appropriately use social networks and protect your privacy After taking this course, you should be able to:  Analyze different types of messaging from mass media  Find information quickly and effectively  Use online software to collect information and create content  Use different kinds of social networks appropriately
  • 3. Some of what we’ll cover: Information literacy Advertising techniques Memes Social Media Music Genres Charts, Polls and Graphs Slang and Popular Culture Whatever you come up with!
  • 4. Grading Your grades will be determined as follows: Quizzes – 20% Exams – 20% Presentations – 20% Assignments – 25% Attendance and participation – 15% For attendance - do NOT miss more than 3 classes. Come on time. Turn off your cell phones. I’M SERIOUS! Have fun - Pop culture is mean to be enjoyed!
  • 5. Our class website media.jadekite.com You’ll need to register for the website. Go to the website. Register. Don’t forget to open your email for the link Log in. Post your student number and English name on the post.
  • 6. Let’s get started! Chat acronyms What do these mean? LOL CUL8R AFAIK b4 AFK BCNU BRB BTW
  • 7. Let’s get started! Chat acronyms What do these mean? LOL - Laugh Out Loud CUL8R - See You Later AFAIK - As Far As I Know b4 - Before AFK - Away From the Keyboard BCNU - Be seeing you BRB - Be Right Back BTW - By The Way
  • 8. Pop Culture? Pop Music! www.youtube.com/watch?v=09R8_2nJtjg The video shows Maroon 5 crashing (coming without an invitation) weddings in Los Angeles.
  • 9. Pop Culture? Pop Music! www.youtube.com/watch?v=kt0g4dWxEBo "FourFiveSeconds" received critical acclaim from music critics, who praised Rihanna's and West's new direction, their vocals, and the song's simple style. Internationally, the song reached number one in Australia and the top five in Canada, France, New Zealand and the United Kingdom.
  • 10. Pop Culture? Pop Music! www.youtube.com/watch?v=MYSVMgRr6pw Hozier (Andrew Hozier-Byrne) wrote and recorded the song in the attic of his parent's home in Bray, County Wicklow, Ireland. Its lyrics detail Hozier's frustration with the Catholic Church and its stance on homosexuality.
  • 11. Pop Culture? Pop Music! www.youtube.com/watch?v=lp-EO5I60KA He made a guest appearance on Taylor Swift's fourth studio album, Red, and wrote songs for One Direction. He spent much of 2013 touring North America as the opening act for Swift's The Red Tour.
  • 12. Pop Culture? Pop Music! www.youtube.com/watch?v=OPf0YbXqDm0 Mark Daniel Ronson is an English musician, DJ, singer, and record producer. Bruno Mars’ real name is Peter Gene Hernandez. info: Wikipedia and http://www.billboard.com/charts/hot-100
  • 13. THREATS AND ISSUES WHEN YOU USE THE INTERNET Being careful online
  • 14. Internet Security The internet is such a big part of your lives that we can forget that it even though it is convenient, it can also be dangerous. You need to be careful. Today I will introduce some of the most common threats ( 威 脅 ). Sources: http://www.slideshare.net/TechSo upGlobal/security-basics-webinar http://en.wikipedia.org/ Malware Phishing Social Network Hacking
  • 15. Malware Most of you have heard of a computer “virus” before… Viruses are actually a kind of Malware ( 惡意軟體 ) Virus - a program that can spread from computer to computer by itself. Trojan - a hidden program (for example in free / illegal software) Bot - a robot network which can be controlled outside the computer. Keystroke logger (keylogger): a program that records what you type into the computer.
  • 16. Virus Some viruses can be harmless, but others can slow down or even ruin a computer. Many people don’t even know that their computer has a virus at all. A computer virus is a computer program that can spread from one computer to another. A virus can spread from one computer to another using code, for instance because a user sent it over the Internet, or carried it on a memory device such as a CD, DVD, or USB drive. Viruses that spread them- selves online or across a network are called worms.
  • 17. Trojans The term “Trojan” comes from the Greek story about the Trojan Horse from a very old story (The Iliad). In the story, Greeks left a big wooden horse to the Trojans, people they were at war against. After the Trojans brought the horse into the city, the Greeks who were hidden inside snuck out and opened the city gates to let the Greek army come in and destroy the city of Troy. A Trojan horse, or Trojan, is software that hides inside software and then steals information or hurts the user’s computer. Some things trojans can do to your computer:  Make your computer a “zombie”  Download or upload files  Steal your information  Watch your screen  Crash your computer  Record your keystrokes
  • 18. Bots, botnets and zombies! Bots, or internet robots, didn’t start out as bad - and not all of them are. For example, Google uses bots to get for their search results. What we are talking about here are botnets, which take over computers and become an army of computers doing what they are told, or zombies, by an outside program. One kind of malware, usually brought into a computer through a trojan, is a bot. Here’s one of the way hackers can use bots:
  • 19. Bots, botnets and zombies! Bots, or internet robots, didn’t start out as bad - and not all of them are. For example, Google uses bots to get for their search results. What we are talking about here are botnets, which take over computers and become an army of computers doing what they are told, or zombies, by an outside program. Botnets are bad. Really bad. They can be used to send spam, send or download files or even more malware, and they can even be used for Distributed Denial of Service (DDoS) attacks, where so many different computers are told to go to the same website all at the same time that the website crashes.
  • 20. Keyloggers Keyloggers are actually quite easy to write. Usually keyloggers are put together with other types of malware. Keyloggers simply record whatever the user is typing on their keyboard. Some keyloggers also record what is on the screen at the same time. Here’s an example of a keylogger file that also shows what form the user was typing in (form grabbing):
  • 21. Keyloggers Keyloggers are some of the worst kinds of malware. Spies love keyloggers, and countries often try to sneak them onto computers. Sometimes people use them to spy on each other - for example, maybe a husband thinks his wife has a secret boyfriend… Criminals use keyloggers to try to get usernames and passwords for bank information.
  • 22. Phishing While phishing isn’t a from of malware (it’s more like tricking you and stealing), it’s becoming more and more common, and more dangerous. Phishing is a way of tricking people into giving their information to what they think is a site they can trust. Here’s an example: The link in the email takes you to a login page that asks you to type in your gmail information. Look at the domain name!
  • 23. More Phishing Phishing has become a real problem in recent years, and social media sites are one of their favorite targets. Here’s another example of an email that takes you to a phishing site:
  • 25. And a “friend phishing” example:
  • 26. Who is Sophie Ng? Let’s see if Google knows her: Take one of her profile pictures and put it into Google images. Hey, that’s a different name! What’s going on?
  • 27. After Google searching… After uploading a couple of “Sophie” pictures to Google and getting several different Facebook profiles, her pictures appeared on a different site, where she was listed as “Cute college girl of the day for October 22, 2010” It turns out that people use her (and other college girl photos) to try to get people to accept her as a Facebook friend. Once she has been accepted, the hackers can get information on you and your friends, or get other people to click on links that will download malware to their computers.
  • 28. Why? Why are people doing this? What’s the point? Underground cybercrime economy Bigger business than international drug trade Hackers with computer skills and desire for money Organized online buy/sell of stolen data Low risk, high reward - many hackers can attack anywhere in the world from their own countries, and most countries don’t have strong laws against hacking
  • 29. OK Now: Log into Facebook and check through your friends. Do you really know them?  Go to Facebook. If there are people in your friends list that you don’t really know, put the link to their picture into Google images and see if they are really who they say they are.  Check your email. Are there any emails asking you to update your information? If so, check the domain name. Is it really the website it says it is?  Update your anti-virus software and do a full system scan of your computer at least once a week. Change your passwords every 3-4 months  Think! Be skeptical ( 懷疑論的 ) about what people are sending you, and be careful!
  • 30. So what can you do? How can you protect yourself from these kinds of online threats? Don’t expect something for nothing. Don’t download pirated software, or “keygens” - software that will give you a license number for software. Don’t friend people on Facebook that you don’t know - even if you think they’re attractive! Carefully check where your email is coming from - always check the domain name of the sender.
  • 32. The Interesting Character Some of the world's most memorable advertisements use this technique. The character needs to be interesting. Different. Unexpected. With lots of personality, or quirky (unusual) behavior. These characters will grab attention because they are strong and different from other ads, making people remember them. source; http://www.adcracker.com/
  • 33. Some examples PX mart The Most Interesting Man in the World Panda Cheese Old Spice
  • 34. Meme of the Week • Ideas can spread very quickly. Things can become very popular in a very short time. • For example, viral videos – in a very short time, millions of people will have hear of and seen a certain video online. • This sudden popularity online is called a meme. • What's a meme?
  • 35. Memes and their cycles • Memes almost always have phases, or time periods. • Introduction. The meme is introduced, and becomes popular. • Overexposure – the meme becomes too popular, and people start to get tired of it. • Parody – people will make fun of the meme, usually by changing or “remixing” it. • Equilibrium – finally, the meme calms down, and is only occasionally used, or it goes away.
  • 36. Review What’s the class website? What are you going to learn in this class? How many classes can you miss? What are the following: Why do you have to be careful on Facebook? LOL CUL8R AFAIK b4 AFK BCNU BRB BTW What meme did we learn about this week? Who has the most popular popular pop song in America this week? What is it?